IntSights' Blog

Over the past few years, online shopping has grown significantly, making it extremely easy to order anything you like, whenever you like, to wherever you like. Technology has made it more convenient for us to purchase goods, and threat actors are no exception. This growth in online shopping,...

We've reached the final strategy in our series, 6 Ways to Upgrade your Threat Intelligence Program. This final strategy focuses on your digital attack surface, which extends to any vendor or partner that you share data with. If they get breached, there’s a chance your data can be exposed, so it...

It's another week, which means another tip for upgrading your threat intelligence program: Take Down Fraud Campaigns & Cyber Scams. Cyber fraud is a booming business for hackers, generating millions of dollars worth of fraudulent purchases each year. Even if a company is not responsible for...

In part 4 of our blog series, we focus on: Expanding Protection to Your Customers and Your Brand. As corporate cyber defenses have become stronger and more efficient, threat actors have turned to what's typically the weakest link, the customer. Cybercriminals often impersonate popular brands...

Over the past few years, we’ve seen a noticeable increase in cybercriminals using social media as part of their attack strategy. Whether it’s a phishing campaign, online impersonation or just simply trying to promote their goods or services, social media provides hackers with a large audience...

To continue our blog series on how to upgrade your threat intelligence program, we turn to part 3: leverage automation and integrations. The longer a threat goes unmitigated, the bigger risk it poses. That’s why automation is key to an effective threat intelligence program. Using integrations...

What good is threat intelligence if you can’t take action on it? At IntSights, our goal is to help organizations operationalize their threat intelligence, which is why we’re highly focused on integrating our platform with leading security and technology solutions.

We continue our blog series on how to upgrade your threat intelligence program with part 2: focus on action, not searching. There is lots of threat data and threat intelligence that you can consume. You might think that it's better to have access to as much information as possible, but this...

Threat hunters and incident responders rely on intelligence to see, identify and respond to attacks. There are many different forms of intelligence, like Open-Source Intelligence (OSINT), Signals Intelligence (SIGINT), and Social Media Intelligence (SOCMINT). However, the one constant behind all...

Over the past few years, online shopping has grown significantly, making it extremely easy to order anything you like, whenever you like, to wherever you like. Technology has made it more convenient for us to purchase goods, and hackers are no exception. This why one of the most targeted sectors...

Cyber Threat Intelligence (CTI) is a hot buzzword in the world of cybersecurity. Many enterprise organizations are beginning to build out a dedicated threat intelligence program, focused on proactively identifying and hunting cyber threats before they are carried out as an attack. This has...

The 2018 NFL season kicks off this week, meaning football fans and fantasy team owners are gearing up for what’s sure to be an exciting season. There are lots of expressions and sayings in football, like there’s no “i” in “Team” or clear eyes, full hearts, can’t lose. But there’s one saying that...

As long as banks have money, there will always be bank robberies. However, the shouts of “Nobody move, nobody gets hurt,” has been replaced by the dull clicks of hacker keystrokes halfway across the globe. Hackers treat banks as their personal ATMs. They slip in and out of hidden cyber tunnels...

Revolutionizing cybersecurity with the first of its kind enterprise threat intelligence and mitigation platform that drives proactive defense by turning tailored threat intelligence into automated security action.